http://secondlookforensics.com/images.html
http://digitalcorpora.org/archives/250
http://torrent.ibiblio.org/torrents/53f81e99656b21ed2fb94c7b5d473dbc7120bb8a
http://old.honeynet.org/misc/files/challenge-images.tar
http://www.cfreds.nist.gov/Hacking_Case.html
http://www.shortinfosec.net/2008/07/competition-computer-forensic.html
http://www.cfreds.nist.gov/dfrws/Rhino_Hunt.html
http://www.dfrws.org/2011/challenge/
http://www.dfrws.org/2010/challenge/
http://www.dfrws.org/2009/challenge/submission.shtml
http://www.dfrws.org/2008/challenge/submission.shtml
http://www.dfrws.org/2007/challenge/submission.shtml
http://www.dfrws.org/2006/challenge/submission.shtml
http://www.dfrws.org/2005/challenge/
http://myweb.cwpost.liu.edu/cmalinow/csi/tools.html
http://www.lnx4n6.be/Downloads/usb-key-hack.lu-0.3.dd
https://www.honeynet.org/node/504
https://www.honeynet.org/files/attack-trace.pcap_.gz
https://www.honeynet.org/challenges/2010_2_browsers_under_attack
https://www.honeynet.org/files/suspicious-time.pcap
https://www.honeynet.org/challenges/2010_3_banking_troubles
https://www.honeynet.org/challenge2010/downloads/hn_forensics.tgz
http://digitalcorpora.org/corpora/cell-phones
0sem comentários ainda